El Paso Ambulatory Clinic Policy and Procedure

Size: px
Start display at page:

Download "El Paso Ambulatory Clinic Policy and Procedure"

Transcription

1 Title: Regulation Reference: CONTACT CENTER CALL MONITORING AND RECORDING Policy Number: EP 1.22 Effective Date: 1/2015 Policy Statement: It is the policy of the Texas Tech University Health Sciences Center at El Paso (TTUHSC El Paso) to record and monitor any call routed through and from a TTUHSC El Paso Contact Center. Scope and Distribution: The purpose of this policy is to establish procedures to manage call monitoring and recording in accordance with TTUHSC El Paso personnel and security requirements. Call monitoring, recording, storing and archiving of incoming calls to a TTUHSC El Paso Contact Center will be used to improve the service provided to callers and to support staff carrying out their responsibilities. Monitoring, recording, storing, and archiving incoming calls and screen shots will provide an accurate record for the following: a. Identifying Contact Center staff training/developmental needs. b. Protecting Contact Center staff from abusive or nuisance calls. c. Improving Contact Center staff performance and quality of service to our patients. d. Establishing facts in the event of a complaint either by a caller or a staff member and assist in resolution. e. Assisting in Contact Center quality control to identify issues in Contact Center procedures with the goal of improvement. f. Confirm calls are accurately and efficiently transcribed when needed. This policy applies to any call routed through and from a TTUHSC El Paso Contact Center in the ambulatory clinics. Definitions: 1. Contact Center: A contact center is an automated call distribution system used at TTUHSC El Paso to handle and manage patient phone calls. 2. Call: A call is defined as the voice call itself, as well as related workstation screen shots of the contact center agent handling the call. 3. Contact Center Manager: A contact center manager is the individual or designee who is responsible for the overall operations of a contact center and the software applications. 4. Contact Center Agent Supervisor: A contact center Supervisor is a Department employee assigned to oversee the performance of the contact center agents within that Department. 5. Contact Center Agent: A contact center agent is considered any employee who handles patient calls routed through the TTUHSC El Paso Contact Center. Page 1 of 5

2 6. Call monitoring: The listening to a live or recorded interaction between an incoming caller and an agent generally used in training and, on an ongoing basis, to ensure that customer service and productivity goals are being met. Procedure: 1. All TTUHSC El Paso contact center callers will be advised as part of the welcome message that calls may be monitored and/or recorded for service improvement purposes. 2. TTUHSC El Paso contact center shall be utilized strictly for the handling of business related calls. The system shall not be utilized for ANY personal/private matter of any kind. 3. Each Department shall notify the Contact Center Manager via TTUHSC , of each individual designated in their Department as a Contact Center Agent, and the Contact Center Agent Supervisor, as well as any additions or deletions. The Contact Center Manager will maintain a summary list of such individuals. 4. Contact Center Agent Supervisors will notify Contact Center agents, either at time of hire or upon assuming Contact Center responsibilities that any call routed through the TTUHSC El Paso Contact Center may be monitored and/or recorded. This information will also be included in the Position Description of all Contact Center agents. 5. Contact Center Agent Supervisors shall document that each employee is informed of the work place areas that are subject to monitoring and/or recording and that TTUHSC El Paso Contact Center phones should not be relied on as confidential if used for discussion of private matters. This will be accomplished by the Contact Center Agent signing the Notice of Monitoring (attachment A ). The original signed form will be forwarded along with the request for access to the AVAYA system. A copy of the form will be maintained by the Contact Center Agent Supervisor and Contact Center Manager. 6. Contact Center Managers shall notify agents of the standards on which their calls will be evaluated in writing prior to utilizing monitored calls for a formal evaluation or disciplinary process. 7. Contact Center Manager will identify and designate areas where recording takes place and verify appropriate personnel who have authority to access recorded data. 8. Contact Center Manager must seek further guidance from the Vice President for Human Resources if a recording has been identified as part of a disciplinary investigation. 9. Contact Center calls may be monitored live, or stored and reviewed via two mechanisms: Quality Management (QM) and Archive Recording. The Texas Tech University System Communication Services department shall store call recordings securely, with access to the recordings controlled and managed by Communication Services in conjunction with the TTUHSC El Paso Information Technology (IT) Security team. 10. Access to the recordings will be controlled by eraider login and will be restricted to TTUHSC El Paso Contact Center Managers and Supervisors designated by the senior person at the appropriate school, institute, operating unit, or department/division. All access to recorded calls is logged. Page 2 of 5

3 11. Communication Services will provide training on how to live monitor and access recorded calls and screen recording to Contact Center managers who require it. 12. The Quality Management functionality stores calls and related screen shots for a pre-defined period of time (currently 30 days) after the call. Contact Center Agent Supervisors or the Contact Center Manager may access these recordings at any time as deemed necessary to support the business operations of the clinic. 13. Certain calls may be identified as needing to be retained for a period greater than 30 days or indefinitely. Examples of such calls may include significant patient complaints, threats against individuals or the institution, or for use in the employee disciplinary processes. Such calls will be retained in the archive recording process. The process to archive a call is as follows: a. A call requiring archiving is identified by an authorized user of the AVAYA system. b. A request to archive the call is generated by the Contact Center Agent Supervisor to the Contact Center Manager via TTUHSC . The request should contain at a minimum i. Identifying information about the call including Call ID, caller number, date, and time ii. A brief description of the reason for the request to archive. c. The Contact Center Manager will forward the request to TTU System Communications. d. TTU System Communications will locate the recording and move it to a secure server for storage. e. Requests to access an archived recording may be initiated by the Contact Center Manager or Contact Center Agent Supervisor to the Contact Center Manager. These individuals are encouraged to communicate with Human Resources or the Office of General Counsel on campus prior to requesting the release of the recording. f. Release of the recording, or a transcript, will be made available to Human Resources or the Office of General Counsel on campus. In no circumstances, will the release be made directly to the Contact Center Manager or Contact Center Agent Supervisor. Release of the recording and / or transcript will be made to the Contact Center Manager or Contact Center Agent Supervisor by Human Resources or the Office of General Counsel. Violation of This Policy: Violation of any part of this operating policy may result in disciplinary action in accordance with other applicable TTUHSC policies. Right to Change Policy: TTUHSC El Paso reserves the right to interpret, change, modify, amend, or rescind this policy in whole or in part at any time without the consent of employees. Page 3 of 5

4 Policy Number: EP 1.22 Original Approval Date: 1/2015 Version Number: 1 Revision Date: Signatory approval on file by: Michael J. Romano, M.D. Associate Dean of Clinical Affairs Clinic Operations Committee, Chair Texas Tech University Health Sciences Center El Paso Page 4 of 5

5 Attachment A Notice of Monitoring During Use of Contact Center Phones. I have received a copy of the TTUHSC EP Ambulatory Policy # 1.22, Contact Center Call Monitoring and Recording. I am aware of the following 1. The use of the contact center should be restricted to business related calls. 2. All calls into and out of the contact center may be monitored live, are recorded and retained for a minimum of 30 days. 3. In the event I believe a call should be retained longer than 30 days, I should contact my supervisor. 4. I am aware that call recordings may be used for training, evaluation, and disciplinary processes. Department: Contact Center Agent Contact Center Agent Supervisor Date Date This form should be submitted, along with the request for AVAYA access, to the Contact Center Manager. A copy should be retained by the Department and the Contact Center Manager. Page 5 of 5

El Paso - Ambulatory Clinic Policy and Procedure

El Paso - Ambulatory Clinic Policy and Procedure Regulation Reference: El Paso - Ambulatory Clinic Policy and Procedure Title: Disposal of Expired Medications Policy Number: EP 3.5 Policy Statement: Effective Date: 8/1/2014 It is the policy of Texas

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

College of Education Computer Network Security Policy

College of Education Computer Network Security Policy Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College

More information

TEXAS TECH UNIVERSITY HEALTH SCIENCES CENTER EL PASO

TEXAS TECH UNIVERSITY HEALTH SCIENCES CENTER EL PASO TEXAS TECH UNIVERSITY HEALTH SCIENCES CENTER EL PASO Operating Policy and Procedure HSCEP OP: PURPOSE: REVIEW: 50.37, Payment Card Processing by TTUHSC El Paso Departments The purpose of this Texas Tech

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Online Employment System User Manual

Online Employment System User Manual Troy University Online Employment System User Manual People Admin Version 7 Human Resources April 2014 Table of Contents Introduction... 2 User Types and Access... 2 Creating a User Account... 3 Homepage...

More information

Texas Tech University Health Sciences Center Billing Compliance Program Policy and Procedure

Texas Tech University Health Sciences Center Billing Compliance Program Policy and Procedure 5.1 Responding to External Billing Audit Requests Approved Date: December 2, 2010 Effective Date: December 2, 2010 Latest Revision: A. PURPOSE The purpose of this policy is to establish a process to promptly

More information

Healthcare Compliance and Hybrid Entity Designation

Healthcare Compliance and Hybrid Entity Designation [New OP initial posting 8/28/14] Operating Policy and Procedure : Healthcare Compliance and Hybrid Entity Designation DATE: August 28, 2014 PURPOSE: The purpose of this Texas Tech Operating Policy and

More information

How To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For

How To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For Banner HR Account Request System Login and Usage: Login: 1. Go to http://accounts.unh.edu 2. Click on the IT Accounts Management System button 3. Login Adding Security Roles After logging in the Home screen

More information

Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE

Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE GGHSON FACULTY assembly The purpose of the Faculty Assembly shall be to: Facilitate involvement of the faculty in communication and

More information

TTUHSC Staff Performance Management Employee Self Assessment User s Guide 12/2011

TTUHSC Staff Performance Management Employee Self Assessment User s Guide 12/2011 TTUHSC Staff Performance Management Employee Self Assessment User s Guide 12/2011 1 Table of Contents Program Overview... 3 Self Assessment...4 STEP 1 - Click the Self Assessment form link..4 STEP 2 -

More information

Information Security Operational Procedures Banner Student Information System Security Policy

Information Security Operational Procedures Banner Student Information System Security Policy Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides

More information

Information Security Operational Procedures

Information Security Operational Procedures College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by

More information

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002 Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Information Systems Security Policy

Information Systems Security Policy Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval

More information

NYCC Call recording policy

NYCC Call recording policy NYCC Call recording policy Author Tristram Gardner Version V5 Updated By Sarah Foley Issue Date Oct 2009 Last Update May 2013 Summary This document outlines the North Yorkshire County Council (NYCC) policy

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

Drug and Alcohol Testing for Safety- and Security-sensitive Positions

Drug and Alcohol Testing for Safety- and Security-sensitive Positions [Minor revision posted 3/7/14 (replaces 1/27/12 edition)] Operating Policy and Procedure : Drug and Alcohol Testing for Safety- and Security-sensitive Positions DATE: March 7, 2014 PURPOSE: The purpose

More information

Policies of the University of North Texas

Policies of the University of North Texas Policies of the University of North Texas 8.5 Use of University Non-Wireless and Wireless Telephones, Telephone Lines, Fax Machines and Personal Computing Devices Chapter 14 Chapter Name Information Technology

More information

EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION

EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION Risk Assessment Committee Statement of Purpose The Emergency Response Plan is a comprehensive framework for the management of critical incidents, issues, or

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Policy Number: 04.75.12 Issuing Authority: Office of the Vice President for Computer and Financial Services, and Chief Information Officer Responsible

More information

b. Advancement: A promotion to the next higher level of qualification. Minimum Pay Plan for Utilities Operator Minimum Pay Grade

b. Advancement: A promotion to the next higher level of qualification. Minimum Pay Plan for Utilities Operator Minimum Pay Grade PHYSICAL PLANT OPERATING POLICY AND PROCEDURE : Personnel Qualification System DATE: August 23, 2013 PURPOSE The purpose of this Physical Plant Operating Policy and Procedure (PP/OP) is to set forth procedures

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

REGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions

REGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions T r a n s l a t e d i n H S E E x p e r t T r a n s l a t i o n C e n t r e 1 APPROVED by Directive No. 31.1-04/771 of the State University Higher School of Economics dated October 22, 2010 REGULATIONS

More information

Texas Tech University Health Sciences Center-El Paso. Medical Equipment Management Plan

Texas Tech University Health Sciences Center-El Paso. Medical Equipment Management Plan Texas Tech University Health Sciences Center-El Paso Medical Equipment Management Plan Medical Equipment Management Plan Contents I. Objective and Purpose II. III. IV. Selection and Acquisition Equipment

More information

Operating Policy and Procedure. DATE: February 9, 2015

Operating Policy and Procedure. DATE: February 9, 2015 [Major revision posted 2/9/15 (replaces 9/19/12 edition)] Operating Policy and Procedure : Overtime DATE: February 9, 2015 PURPOSE: The purpose of this Operating Policy and Procedure (OP) is to establish

More information

WHISTLEBLOWER LAW. Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government.

WHISTLEBLOWER LAW. Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government. WHISTLEBLOWER LAW Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government. 5-301. Applicability. This subtitle applies to all employees and State employees who are applicants

More information

FY16 Minimum Pay Plan for Utilities Operator Minimum Starting Pay. Pay Title

FY16 Minimum Pay Plan for Utilities Operator Minimum Starting Pay. Pay Title OPERATIONS DIVISION : Personnel Qualification System DATE: September 10, 2015 PURPOSE The purpose of this Operations Division Standard Operating Procedure (OD/SOP) is to set forth procedures for administration

More information

IT Security Standard: Patch Management

IT Security Standard: Patch Management IT Security Standard: Patch Management Introduction This standard defines specific procedural and configuration elements needed to implement the Bellevue College policy # 5250: Information Technology (IT)

More information

DEPARTMENT OF AGRICULTURAL EDUCATION & COMMUNICATIONS. Distance Student Information

DEPARTMENT OF AGRICULTURAL EDUCATION & COMMUNICATIONS. Distance Student Information DEPARTMENT OF AGRICULTURAL EDUCATION & COMMUNICATIONS Distance Student Information DISTANCE STUDENT INFORMATION Version 2006 Texas Tech University Lubbock, Texas Written by René Miller, July, 2006 Table

More information

Updated 2014 HOW. the ETHICS PROCESS WORKS

Updated 2014 HOW. the ETHICS PROCESS WORKS Updated 2014 HOW the ETHICS PROCESS WORKS INTRODUCTION Lockheed Martin employees have a shared commitment to the highest standards of ethical conduct and a vital responsibility for upholding the values

More information

BAPTIST HEALTH CORPORATE COMPLIANCE PLAN

BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH and its subsidiaries have a long-standing reputation for conducting both business and patient care activities with the highest level of ethical behavior

More information

UNIVERSITY COMPLIANCE PLAN

UNIVERSITY COMPLIANCE PLAN UNIVERSITY COMPLIANCE PLAN Objectives of the Compliance Program The University Compliance Program provides a proactive program that ensures full compliance with all applicable policies, procedures, laws

More information

Policy on Background Checks and Credential Verifications

Policy on Background Checks and Credential Verifications HUMAN RESOURCES Effective Date: October 2013 Date Revised: N/A Supersedes: Background Check Policy, Credential Verification Policy Related Policies: Responsible Office/Department: Human Resources Management

More information

THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS

THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS This form allows students to grant third parties, including parents, access to their educational records

More information

Supervisor Website Training Manual

Supervisor Website Training Manual Supervisor Website Training Manual Welcome to Eastern Connecticut State University s Student Employment Website! Making the connection between student applicants and supervisors easier than ever. The On-Campus

More information

Office of the President University Policy

Office of the President University Policy Office of the President University Policy SUBJECT: UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY Effective Date: 7-3-12 Policy Number: 4.1.2 Supersedes: Page Of Presidential 1 6 Memorandum #85 Responsible

More information

Applicant Online Guide

Applicant Online Guide Applicant Online Guide Purpose This is a guide to assist applicants submit their application to Brunswick County for a posted position. System Compatibility 1.) This Application tool works best with Internet

More information

St. John Fisher College Banner/ApplicationXtender Access Request Form

St. John Fisher College Banner/ApplicationXtender Access Request Form St. John Fisher College Banner/ApplicationXtender Access Request Form The Banner/ApplicationXtender Access Request Form consists of five pages, this instruction page and four pages for access request of

More information

DEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES

DEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES DEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES POLICIES AND PROCEDURES Subject: ADMINISTRATION OF HIPAA Effective Date: 12/15/03 Review Date: 6/8/06 Revision Date: 11/21/06 (All legal citations

More information

Louisiana State University School of Medicine at Shreveport

Louisiana State University School of Medicine at Shreveport Louisiana State University School of Medicine at Shreveport Policy Date Updated Page Compliance Policy Summary -- 2 Vendor Solicitation Policy 4/1/2011 8 Drug Samples 7/1/2010 11 Continuing Medical Education

More information

Hosted Voice Product Training Automatic Call Distributor (ACD)

Hosted Voice Product Training Automatic Call Distributor (ACD) Hosted Voice Product Training Automatic Call Distributor (ACD) 1 Agenda 1. Customer Resource Center 2. Logging In 3. Main Screen 4. Search Calls 5. Download Reports 6. Queues 8. Monitor 9. Whisper 10.

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act

More information

IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009

IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying

More information

DePaul University Records Management Manual November 1, 2014

DePaul University Records Management Manual November 1, 2014 Records Management Manual November 1, 2014 A Note from the Director November 1, 2014 Dear Community Member, On behalf of the Department of Records Management, I welcome you to our vibrant community. As

More information

BOARD OF DIRECTORS COMMUNICATION POLICY. Adopted February 25, 2015

BOARD OF DIRECTORS COMMUNICATION POLICY. Adopted February 25, 2015 1. Policy Statement BOARD OF DIRECTORS COMMUNICATION POLICY Adopted February 25, 2015 Tribune Media Company (the Company ) values the input and insights of its stockholders and other interested parties

More information

Hiring Procedures and Guidelines

Hiring Procedures and Guidelines Hiring Procedures and Guidelines 33.99.01.R0.01 Employment Practices Updated 10/06/2014 A Guide for Hiring This document is provided to be a guide for the hiring process. The document, tools referenced,

More information

TABLE OF CONTENTS. University of Northern Colorado

TABLE OF CONTENTS. University of Northern Colorado TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...

More information

CUNY New York Workplace Violence Policy and Procedures

CUNY New York Workplace Violence Policy and Procedures CUNY New York Workplace Violence Policy and Procedures The City University of New York has a longstanding commitment to promoting a safe and secure academic and work environment that promotes the achievement

More information

Program Statement. U.S. Department of Justice Federal Bureau of Prisons

Program Statement. U.S. Department of Justice Federal Bureau of Prisons U.S. Department of Justice Federal Bureau of Prisons Program Statement OPI: CPD/CPB NUMBER: P5264.08 DATE: SUBJECT: Inmate Telephone Regulations CORRECTED COPY 2/11/2008" Boxed Bold - Federal Regulation

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

Montgomery County Government Department of Information Systems and Telecommunications Internet, Intranet, & Electronic Mail Policy

Montgomery County Government Department of Information Systems and Telecommunications Internet, Intranet, & Electronic Mail Policy Montgomery County Government Department of Information Systems and Telecommunications Internet, Intranet, & Electronic Mail Policy I. PURPOSE This material sets forth Montgomery County s policy (hereafter

More information

UCLA Policy 313: Prevention of Identity Theft

UCLA Policy 313: Prevention of Identity Theft UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

How To Protect Data At Northeast Alabama Community College

How To Protect Data At Northeast Alabama Community College Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014

More information

Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members

Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members These operating procedures supplement the policy on Dispute Resolution for Administrative/Professional and

More information

NOTICE OF PRIVACY PRACTICES (HIPAA Compliance)

NOTICE OF PRIVACY PRACTICES (HIPAA Compliance) Responsible University Administrator: Vice President for Student Affairs Responsible Officer: Director of Student Counseling Services Origination Date: Current Revision Date: 02/21/13 Next Review Date:

More information

A Border Healthcare Dialogue

A Border Healthcare Dialogue Texas Tech University Health Sciences Center and the Dartmouth Institute: A Border Healthcare Dialogue Saturday, November 3, 2012 El Paso Museum of Art 1 Arts Festival Plaza El Paso, Texas, 79901 CONFERENCE

More information

ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its

ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its Constitution, making such regulations as it considers necessary

More information

State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures

State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application

More information

FERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel

FERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA Q &A for Banner Users November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA tutorial http://www.dartmouth.edu/~reg/guides/ferpa/ FERPA = Family Educational

More information

Your Texas Benefits Card

Your Texas Benefits Card Your Texas Benefits Card Provider Interactive Voice Response User Guide How to Access and Use the Provider IVR System to Access Medicaid Member Information Updated: October 10, 2013 Table of Contents Table

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus

More information

Recruitment and Appointment of Academic Administrators

Recruitment and Appointment of Academic Administrators NUMBER: ACAF 1.01 SECTION: SUBJECT: Academic Affairs Recruitment and Appointment of Academic Administrators DATE: February 1, 1995 REVISED: November 11, 2014 Policy for: Procedure for: Authorized by: Issued

More information

BYLAWS of the Graduate School of Biomedical Sciences

BYLAWS of the Graduate School of Biomedical Sciences BYLAWS of the Graduate School of Biomedical Sciences SECTION 1. Programs of the Graduate School of Biomedical Sciences The Graduate School of Biomedical Sciences (GSBS) of the Texas Tech University Health

More information

PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS

PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS The Johns Hopkins University Krieger School of Arts & Sciences/Whiting School of Engineering PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS Established March

More information

INSTITUTIONAL COMPLIANCE PLAN

INSTITUTIONAL COMPLIANCE PLAN INSTITUTIONAL COMPLIANCE PLAN Responsible Party: Board of Trustees Contact: Institutional Compliance Office Original Effective Date: 02/16/2012 Last Revised Date: 10/13/2014 Contents I. SCOPE OF THE PLAN...

More information

U.S. Department of Justice Office of the Inspector General Audit Division

U.S. Department of Justice Office of the Inspector General Audit Division AUDIT OF THE DRUG ENFORCEMENT ADMINISTRATION S LANGUAGE SERVICES CONTRACT WITH SOS INTERNATIONAL, LTD. CONTRACT NUMBER DJDEA-05-C-0020 DALLAS FIELD DIVISION U.S. Department of Justice Office of the Inspector

More information

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012

More information

TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS

TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS DIVISION 2. ACCREDITED LAW SCHOOL RULES Adopted by the Committee of Bar Examiners and Approved by the Board of Governors of The State Bar of California Effective

More information

Administrative Procedures Manual. Management Information Services

Administrative Procedures Manual. Management Information Services I-23.10 Management Information Services The College owns and operates a local area network (LAN) that connects the College's computing hardware and services. Computing hardware refers to any device that

More information

Visiting Scholar and Visiting Researcher Guidelines

Visiting Scholar and Visiting Researcher Guidelines Page 1 of 9 Visiting Scholar and Visiting Researcher Guidelines Section I. General Provisions A. Purpose Statement The University of Texas at Austin recognizes that individuals from other universities,

More information

ADMINISTRATORS GROUP MINUTES March 6, 2014 Meeting

ADMINISTRATORS GROUP MINUTES March 6, 2014 Meeting ADMINISTRATORS GROUP MINUTES March 6, 2014 Meeting NEXT MEETING: Please Note!! The next Administrators Group meeting is scheduled for Wednesday, April 2, 2014 in the Student Union Building, Matador Room.

More information

University of Louisiana System

University of Louisiana System Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution

More information

CUSTOMER SERVICE Operational KPIs

CUSTOMER SERVICE Operational KPIs CUSTOMER SERVICE Operational KPIs Page 1 of 10 Table of Contents SECTION I: CUSTOMER SERVICE STAFFING, STRUCTURE AND LOCATION(S)... 3 A. ORGANIZATIONAL STRUCTURE... 3 B. STAFFING... 4 C. CALL CENTER MEMBERSHIP

More information

BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY

BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY Effective Date Subject Number Page September 14, 2014 RECORDS RETENTION GUIDELINES E-OP-8-14 1 of 11 Supersedes/Supplements: Reference: BC

More information

Policy on Dignity and Respect (Students)

Policy on Dignity and Respect (Students) Policy on Dignity and Respect (Students) Scope and Purpose of the Policy This policy relates to all students of DMU. Every student is personally liable under the Equality Act and is expected to treat staff

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

University Specialty Clinics and Palmetto Health Billing Compliance Plan

University Specialty Clinics and Palmetto Health Billing Compliance Plan Introduction The University of South Carolina School of Medicine Educational Trust d/b/a University Specialty Clinics (USC) manages the clinical faculty practice plan of the University of South Carolina

More information

Account Management Standards

Account Management Standards Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information

More information

Contact Center Help: Report Types Glossary

Contact Center Help: Report Types Glossary Contact Center Help: Report Types Glossary Topic: LiveOps Admin Portal > Help > Report Types Glossary Site: https://tenant.hostedcc.com/mason/admin/help/glossary-rtype.html Date: February, 2015 About The

More information

HIPAA Privacy Policy & Notice of Privacy Practices

HIPAA Privacy Policy & Notice of Privacy Practices HIPAA Privacy Policy & Notice of Privacy Practices 1. PURPOSE 1 The purpose of this policy is to comply with patient personal health information security rights and privacy regulations as outlined in the

More information

UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07

UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07 UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM SECTION: Information Services NUMBER: 07.A.07 AREA: Computing Services SUBJECT: Use of Electronic Messaging Services by Employees 1. PURPOSE The purpose

More information

Information Security Plan May 24, 2011

Information Security Plan May 24, 2011 Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised

More information

Denver Public Schools - East High School

Denver Public Schools - East High School Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student

More information

Appropriate Use Policy for Information Technology

Appropriate Use Policy for Information Technology Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be

More information

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section

More information

UMDNJ COMPLIANCE PLAN

UMDNJ COMPLIANCE PLAN UMDNJ COMPLIANCE PLAN INTRODUCTION...2 COMPLIANCE OVERSIGHT 3 COMPLIANCE COMMITTEE STRUCTURE...4 CHIEF COMPLIANCE OFFICER S RESPONSIBILITIES...5 RESEARCH COMPLIANCE.5 UNIT IMPLEMENTATION.6 COMPLIANCE POLICIES

More information

CREDIT CARD PROCESSING POLICY AND PROCEDURES

CREDIT CARD PROCESSING POLICY AND PROCEDURES CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.

More information

CATASAUQUA AREA SCHOOL DISTRICT

CATASAUQUA AREA SCHOOL DISTRICT CATASAUQUA AREA SCHOOL DISTRICT No. 0 SECTION: Non-Professional Personnel TITLE: Policy Re Drug/Alcohol Testing ADOPTED: November, REVISED: November, 0 REVIEWED: November, 0 0. TESTING FOR ALCOHOL AND

More information

Procedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution

Procedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution Minnesota State Colleges and Universities System Procedures Chapter 1B System Organization and Administration / Equal Education and Employment Opportunity Report/Complaint of Discrimination/Harassment

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

College of DuPage Information Technology. Information Security Plan

College of DuPage Information Technology. Information Security Plan College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data

More information

Policy on Access to Electronic Information As voted by the President and Fellows of Harvard College on March 31, 2014; amended May 8, 2015

Policy on Access to Electronic Information As voted by the President and Fellows of Harvard College on March 31, 2014; amended May 8, 2015 Policy on Access to Electronic Information As voted by the President and Fellows of Harvard College on March 31, 2014; amended May 8, 2015 Scope of Policy This policy sets out guidelines and processes

More information

What is a definition of risk?

What is a definition of risk? What is a definition of risk? Definition of Risk Risk is the probability or threat of any negative occurrence caused by internal or external vulnerabilities interfering with achieving objectives that may

More information

DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING,

DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING, Page 1 of 6 DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING, JC #676 - Classified Management - Integrated Academic Administrator and Classified Manager Salary

More information